Arge Baustahl Hit by Akira Ransomware, Data Leak Threatened
Incident Date:
June 10, 2024
Overview
Title
Arge Baustahl Hit by Akira Ransomware, Data Leak Threatened
Victim
Arge Baustahl
Attacker
Akira
Location
First Reported
June 10, 2024
Ransomware Attack on Arge Baustahl by Akira Group
Overview of Arge Baustahl
Arge Baustahl Eisen Blasy-Neptun GmbH, headquartered in Innsbruck, Austria, is a prominent player in the construction and engineering sector, specializing in steel construction. The company, with a workforce of 51-200 employees, excels in the design, fabrication, and erection of steel structures for buildings, bridges, and industrial facilities. Their commitment to quality and safety, coupled with innovative solutions, has earned them a reputable standing in the industry.
Details of the Attack
Arge Baustahl recently fell victim to a ransomware attack orchestrated by the Akira group. The attackers have claimed that they will soon release internal business information, including project details and drawings, on their dark web leak site. This breach highlights the vulnerabilities that even well-established companies face in the digital age.
About the Akira Ransomware Group
Akira is a rapidly growing ransomware family that emerged in March 2023. The group targets small to medium-sized businesses across various sectors, including construction. Akira employs double extortion tactics, stealing data before encrypting systems and demanding a ransom for both decryption and data deletion. Their unique dark web leak site features a retro 1980s-style interface, adding a distinctive touch to their operations.
Penetration Tactics
Akira's penetration tactics include unauthorized access to VPNs, credential theft, and lateral movement within networks. They utilize tools like RClone, FileZilla, and WinSCP for data exfiltration. In some instances, they have deployed a previously unreported backdoor, further complicating detection and mitigation efforts.
Vulnerabilities and Impact
Arge Baustahl's reliance on digital tools and software for project management and coordination, while enhancing productivity, also presents vulnerabilities. The attack underscores the importance of robust cybersecurity measures, especially for companies handling sensitive and critical infrastructure projects.
Sources
- http://www.arge-baustahl.at
- https://empatic-ux.com/en/casestudies/construction-meets-ux/
- https://www.linkedin.com/company/argebaustahl/
- https://www.dnb.com/business-directory/company-profiles.arge_baustahl_eisen_blasy-neptun_gmbh.b5c327db83cb1b5e706ea80c99fda6e3.html
- https://www.bloomberg.com/profile/company/5566641Z:AV
- https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-akira
- https://news.sophos.com/en-us/2023/12/21/akira-again-the-ransomware-that-keeps-on-taking/
- https://www.tripwire.com/state-of-security/akira-ransomware-what-you-need-know
- https://www.trellix.com/blogs/research/akira-ransomware/
- https://www.ic3.gov/Media/News/2024/240418.pdf
Recent Ransomware Attacks
The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.
The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.